Honest ideals on strand spaces
暂无分享,去创建一个
[1] Colin Boyd,et al. Towards formal analysis of security protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.
[2] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[3] Joshua D. Guttman,et al. Strand spaces: why is a security protocol correct? , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[4] Ulf Carlsen,et al. Cryptographic Protocols Flaws , 1994, CSFW.
[5] Somesh Jha,et al. A model checker for authentication protocols , 1997 .
[6] Lawrence C. Paulson,et al. Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.
[7] U. Carlsen,et al. Cryptographic protocol flaws: know your enemy , 1994, Proceedings The Computer Security Foundations Workshop VII.